[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] last minute patches to build a pdf correctly



Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/home/arma/work/minion/doc

Modified Files:
	minion-design.tex 
Added Files:
	SWAP.pdf 
Log Message:
last minute patches to build a pdf correctly



--- NEW FILE: SWAP.pdf ---
(This appears to be a binary file; contents omitted.)

Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -d -r1.50 -r1.51
--- minion-design.tex	8 May 2002 06:24:59 -0000	1.50
+++ minion-design.tex	8 May 2002 06:39:32 -0000	1.51
@@ -474,7 +474,7 @@
 
 \begin{figure}
 \begin{center}
-\resizebox{10cm}{!}{\includegraphics{SWAP.eps}}
+\resizebox{10cm}{!}{\includegraphics{SWAP}}
 \caption{The operations required by the ``swap'' method} 
 \end{center}
 \end{figure}
@@ -876,8 +876,8 @@
 of opportunity for this attack.
 
 A more complete solution to partitioning attacks may be possible by
-using the ``batch synchronous'' approach described in
-Section \ref{subsec:batching}; this will be a subject of our research.
+using the ``synchronous batch'' approach described in
+Section \ref{subsec:batching}; this is a subject for future research.
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
@@ -1096,8 +1096,8 @@
 % Should really summarise them, but I don't have time :-(
 We would like to explore a
 %One possible approach that we want to explore using Mixminion is a
-strategy called {\em synchronous batching}. This approach prevents these
-attacks even when free routes are used, and improves the
+strategy called {\em synchronous batching}. This approach seems to prevent
+these attacks even when free routes are used, and seems to improve the
 trade-off between latency and anonymity.
 
 The network has a fixed {\em batch period}, $t_\mathrm{batch}$, which is closely
@@ -1172,7 +1172,7 @@
 enabling users to choose nodes that they trust; and interactions with
 the reputation system.
 
-Further analysis of is needed before we can choose a
+Further analysis is needed before we can choose a
 final network structure. Note that a planned structure, where each
 user's software follows the plan consistently when constructing
 routes, will generally be able to achieve stronger and more easily